Elliptic Curve Crypto & ECC Diffie-Hellman Presenter: Le Thanh Binh.

Slides:



Advertisements
Similar presentations
Graph Linear Systems Written in Standard Form
Advertisements

Introduction to Elliptic Curves. What is an Elliptic Curve? An Elliptic Curve is a curve given by an equation E : y 2 = f(x) Where f(x) is a square-free.
Cannonballs, Donuts, and Secrets
1 390-Elliptic Curves and Elliptic Curve Cryptography Michael Karls.
What is Elliptic Curve Cryptography?
 An equation of a line can be written in slope- intercept form y = mx + b where m is the slope and b is the y- intercept.  The y-intercept is where.
4.5 Graphing Linear Equations
Meaning of Slope for Equations, Graphs, and Tables
WRITING EQUATIONS IN SLOPE-INTERCEPT FORM Standard Form Review.
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
Systems of Equations OBJECTIVES To understand what a system of equations is. Be able to solve a system of equations from graphing the equations Determine.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Electronic Payment Systems Lecture 5: ePayment Security II
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
CPE5021 Advanced Network Security --- Advanced Cryptography: Elliptic Curve Cryptography --- Lecture 3 CPE5021 Advanced Network Security --- Advanced Cryptography:
Codes, Ciphers, and Cryptography-RSA Encryption
EXAMPLE 1 Write an equation of a line from a graph
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY COMP 425: Information Security CHAPTER 8 Public Key Crypto (Chapter 4 in the textbook) INFORMATION SECURITY.
Lecture 10: Elliptic Curve Cryptography Wayne Patterson SYCS 653 Fall 2009.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Application of Elliptic Curves to Cryptography
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Chapter 4: Public Key Cryptography
Point-Slope Formula Writing an Equation of a line Using the Point-Slope Formula.
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Basic Elliptic Curve Cryptography 1Lt Peter Hefley 90 OSS Instructor Fall ‘06.
KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS - Chapter 10 KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS - Chapter 10 KEY MANAGEMENT DIFFIE-HELLMAN KEY.
The Modulus Function Objectives: Understand what an absolute value is. Solve equations and inequalities involving modulus. Graph modulus functions.
An Introduction to Elliptic Curve Cryptography
Elliptic Curves Number Theory and Cryptography. A Pile of Cannonballs A Square of Cannonballs.
GRE: Graphical Representations
Lecture 11: Elliptic Curve Cryptography Wayne Patterson SYCS 653 Fall 2008.
5.3 Standard Form of a Line Finding an Equation Given Two Points Write the equation of the line which contains: (-2, 3) (4, 5) Slope (m)=
1 Network Security Dr. Syed Ismail Shah
SOLVING LINEAR SYSTEMS by GRAPHING ADV133 Put in slope-intercept form: y = mx + b. y = 4x – 1 y = –x + 4 The solution to a system of linear equations is.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
What happens if we graph a system of equations and the lines intersect? y = x-1 y = 2x-2.
Graphing Quadratics. Finding the Vertex We know the line of symmetry always goes through the vertex. Thus, the line of symmetry gives us the x – coordinate.
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.
1. Write the equation in standard form.
Elliptic Curve Public Key Cryptography
§ 1.3 Intercepts.
Quick Graphs of Linear Equations
Linear Equation in Two Variables
Writing Linear Equations in Slope-Intercept Form
Curves Dr Duxbury.
Quick Graphs of Linear Equations
Equations of Lines Point-slope form: y – y1 = m(x – x1)
Ways to represent them Their uses
m is the slope b is the y-intercept
Equations of Lines.
Elliptic Curves.
Graphical Solution of Simultaneous Equations
SYSTEMS OF LINEAR EQUATIONS
Elliptic Curve Cryptography (ECC)
Points of intersection of linear graphs an quadratic graphs
3.5 Write and Graph Equations of Lines
Elliptic Curve Cryptography (ECC)
USING GRAPHS TO SOLVE EQUATIONS
6.4 Volumes by Cross Sections
2.3 Graph Equations of Lines
3.1 Reading Graphs; Linear Equations in Two Variables
Write Equations of Lines
Geometry Section 3.5.
Functions in the Coordinate Plane
2.3 Quick Graphs of Linear Equations
Graphical Solution of Simultaneous Equations
m is the slope b is the y-intercept
Presentation transcript:

Elliptic Curve Crypto & ECC Diffie-Hellman Presenter: Le Thanh Binh

Outline 1.What is Elliptic Curve ? 2.Addition on an elliptic curve 3.Elliptic Curve Crypto (ECC) 4.ECC Diffie–Hellman

Lets start with a puzzle… What is the number of balls that may be piled as a square pyramid and also rearranged into a square array?

Lets start with a puzzle… What is the number of balls that may be piled as a square pyramid and also rearranged into a square array? Sol: Let x be the height of the pyramid… Thus, We also want this to be a square: Hence, (4900 balls) y=70

Graphical Representation Curves of this nature are called ELLIPTIC CURVES

What is an Elliptic Curve ? An elliptic curve E is the graph of an equation of the form y 2 = x 3 + ax + b “Elliptic curve” is not a cryptosystem

Addition on an elliptic curve mod p The Elliptic Curve E

Addition on an elliptic curve mod p Start with two points P and Q on E

Addition on an elliptic curve mod p Draw the line L through P and Q.

Addition on an elliptic curve mod p The line L intersects the cubic curve E in a third point. Call that third point R.

Addition on an elliptic curve mod p Draw the vertical line through R. It hits E in another point.

Addition on an elliptic curve mod p We define the sum of P and Q on E to be the reflected point. We denote it by P ⊕ Q or just P + Q

Addition on an elliptic curve mod p If P 1 and P 2 are on E, we can define P 3 = P 1 + P 2 P1P1 P2P2 P3P3 x y

Addition on an elliptic curve mod p Suppose that we want to add the points on the elliptic curve Let the line connecting P 1 to P 2 be L : y = mx + v Explicitly, the slope and y-intercept of L are given by

Addition on an elliptic curve mod p We find the intersection of by solving We already know that x1 and x2 are solutions, so we can find the third solution x3 by comparing the two sides of Equating the coefficients and hence Then we compute y3 And finally

Addition on an elliptic curve mod p Consider y 2 = x 3 + 2x + 3 (mod 5) x = 0  y 2 = 3  no solution (mod 5) x = 1  y 2 = 6 = 1  y = 1,4 (mod 5) x = 2  y 2 = 15 = 0  y = 0 (mod 5) x = 3  y 2 = 36 = 1  y = 1,4 (mod 5) x = 4  y 2 = 75 = 0  y = 0 (mod 5) Then points on the elliptic curve are (1,1) (1,4) (2,0) (3,1) (3,4) (4,0) and the point at infinity:  What is (1,4) + (3,1) = P 3 = (x 3,y 3 )?

Consider y 2 = x 3 + 2x + 3 (mod 5) What is (1,4) + (3,1) = P 3 = (x 3,y 3 )? P1P1 P2P2 P3P3 x yy=mx+v y 2 =x 3 +Ax+B Addition on an elliptic curve mod p m= (1-4)  (3-1) -1 = -3  2 -1 ((a mod n)(b mod n)) mod n = ab mod n = (2)(3) mod 5 = 6 mod 5 = 1 = ((-3 mod 5)(2 -1 mod 5))mod5

Consider y 2 = x 3 + 2x + 3 (mod 5) What is (1,4) + (3,1) = P 3 = (x 3,y 3 )? Addition on an elliptic curve mod p m= 1 x 3 = = 2 (mod 5) y 3 = 1(1-2) - 4 = 0 (mod 5) On this curve, (1,4) + (3,1) = (2,0) P1P1 P2P2 P3P3 x yy=mx+v y 2 =x 3 +Ax+B

Elliptic Curve Crypto (ECC) Elliptic curve cryptography [ECC] is a public-key cryptosystem (just like RSA)

Public Private Public-key cryptosystem

Public Public-key cryptosystem

??? Secret Public-key cryptosystem

Addition on an elliptic curve

ECC Diffie-Hellman Public: Elliptic curve and point (x,y) on curve Private: Alice’s A and Bob’s B Alice, A Bob, B A(x,y) B(x,y)  Alice computes A(B(x,y))  Bob computes B(A(x,y))  These are the same since AB = BA

Public: Curve y 2 = x 3 + 7x + b (mod 37) and point (2,5)  b = 3 Alice’s private: A = 4 Bob’s private: B = 7 Alice sends Bob: 4(2,5) = (7,32) Bob sends Alice: 7(2,5) = (18,35) Alice computes: 4(18,35) = (22,1) Bob computes: 7(7,32) = (22,1) ECC Diffie–Hellman - Example Addition 4 times

THANK YOU FOR LISTENING THE END